2015
DOI: 10.1007/978-3-319-22204-2_6
|View full text |Cite
|
Sign up to set email alerts
|

The Complexity of Cyber Attacks in a New Layered-Security Model and the Maximum-Weight, Rooted-Subtree Problem

Abstract: This paper makes three contributions to cyber-security research. First, we define a model for cyber-security systems and the concept of a cyber-security attack within the model's framework. The model highlights the importance of game-over components-critical system components which if acquired will give an adversary the ability to defeat a system completely. The model is based on systems that use defense-in-depth/layered-security approaches, as many systems do. In the model we define the concept of penetration… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 10 publications
(11 reference statements)
0
5
0
1
Order By: Relevance
“…Metode waterfall digunakan dalam pengembangan perangkat lunak ini. Metode ini dinilai cocok untuk pengembangan perangkat lunak berskala kecil yang dikerjakan dalam kurun waktu kurang dari enam bulan dan jumlah tim kurang dari tiga orang [3]. Metode waterfall merupakan model klasik yang sifatnya sistematis, pembangunan perangkat lunak dilakukan secara berurutan [4].…”
Section: Metode Penelitianunclassified
“…Metode waterfall digunakan dalam pengembangan perangkat lunak ini. Metode ini dinilai cocok untuk pengembangan perangkat lunak berskala kecil yang dikerjakan dalam kurun waktu kurang dari enam bulan dan jumlah tim kurang dari tiga orang [3]. Metode waterfall merupakan model klasik yang sifatnya sistematis, pembangunan perangkat lunak dilakukan secara berurutan [4].…”
Section: Metode Penelitianunclassified
“…Lemma 4.3. Let M = (T, C, M ) be a CSM where T is a path with its vertices and edges labeled as in (3). (i) If (T, c, p) is a SS for M and there is an i with p i > p i+1 and c i+1 > 0, then the SS (T, c, p ′ ) where p ′ is obtained by swapping the prizes on u i and u i+1 is an improved SS.…”
Section: ⊓ ⊔mentioning
confidence: 99%
“…Threats come from nation states with advanced cyber warfare commands, nation states having less technical capabilities but intent on doing harm, ideologically motivated groups of hackers or extremists, profit-seeking criminals, and others. Building on the work done in [3], in this paper we study a layered-security model and strategies for assigning penetration costs and target-acquisition values so as to minimize the amount of damage an attacker can do to a system. That is, we examine security systems.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations